2.
One Time Pad (OTP) for SMS Encryption ............................ 66
3.
SMS-based Two-factor Authentication ................................ 66
4.
SMS Blue Force Tracking (Personnel) ................................. 67
APPENDIX A.
POWER CONSUMPTION EXPERIMENT ............................... 69
A.
PRE-MEASUREMENT CHECKLIST ................................................. 69
B.
FAILED APPROACHES .................................................................... 70
1.
Power Measurement Resolution .......................................... 70
2.
Failure in SNAPI Notification Service .................................. 71
C.
RESULTS........................................................................................... 72
D.
PROGRAM CODE ............................................................................. 78
APPENDIX B.
SECURE CHAT....................................................................... 85
A.
PROGRAM CODE ............................................................................. 85
LIST OF REFERENCES.......................................................................................... 91
INITIAL DISTRIBUTION LIST ................................................................................. 95
x
THIS PAGE INTENTIONALLY LEFT BLANK
xi
LIST OF FIGURES
Figure 1.
Overview of the GSM Network ............................................................. 6
Figure 2.
Security Components in a GSM Network (After Ref. [12]).................... 8
Figure 3.
GSM Authentication Mechanism .......................................................... 9
Figure 4.
GSM Encryption Mechanism .............................................................. 10
Figure 5.
TMSI Reallocation .............................................................................. 12
Figure 6.
SMS_SUBMIT TPDU with Security Headers (After Ref. [19]) ............ 18
Figure 7.
Structure of Command Header........................................................... 18
Figure 8.
Security Parameter Index Coding [After Ref. [22]) ............................. 19
Figure 9.
KIc Coding (After Ref. [22]) ................................................................ 20
Figure 10.
KID Coding (After Ref. [22])................................................................ 20
Figure 11.
Integrated Mobile Alerts System Architecture (From Ref. [25]) .......... 25
Figure 12.
Secure Socket Layer (From Ref. [29]) ................................................ 33
Figure 13.
E-TEN M600 (From Ref. [33]) ............................................................ 43
Figure 14.
Flow Diagram for Performance Measurement Application ................. 44
Figure 15.
Performance Measurement Application Main Screen......................... 45
Figure 16.
Performance Measurement Application Menu.................................... 46
Figure 17.
Sample Output Log File...................................................................... 48
Figure 18.
RSA Encryption Overhead for One SMS Message ............................ 52
Figure 19.
Secure Chat User Interface (Main Screen)......................................... 56
Figure 20.
Flow Diagram for Main Program......................................................... 58
Figure 21.
Flow Diagram for SEND_MSG Process ............................................. 59
Figure 22.
Flow Diagram for MSG_RECEIVED Process ..................................... 60
Figure 23.
Flowchart for Performance Measurement (Original Approach) .......... 70
Figure 24.
Flowchart for Performance Measurement (Second Approach)........... 71
xii
THIS PAGE INTENTIONALLY LEFT BLANK
xiii
Do'stlaringiz bilan baham: |